Author: Xiong Haiyan Curzon Paul Tahar Sofiène Blandford Ann
Publisher: Springer Publishing Company
ISSN: 0925-9856
Source: Formal Methods in System Design, Vol.30, Iss.2, 2007-04, pp. : 83-116
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Relations between secrets: two formal analyses of the Yahalom protocol
By Paulson L.C.
Journal of Computer Security, Vol. 9, Iss. 3, 2001-01 ,pp. :
On the non-termination of MDG-based abstract state enumeration
By Mohamed O.A. Song X. Cerny E.
Theoretical Computer Science, Vol. 300, Iss. 1, 2003-05 ,pp. :